:fail: does not work to stop spoofed returned addresses

jackie46

BANNED
Jul 25, 2005
536
0
166
Its intestesting that :fail: does not stop spoofed return mail.

We have 5 domains constantly being targetting with ridiculous return email addresses.
:fail: is set on all 5 domains.

Yet the message is being delivered to the mail queue irregardless of the :fail: setting.

:fail is supposed to stop [email protected] and it does but when it is a spoofed return, :fail: is ignored and the message is sent to the mail queue anyway.

Anyone have any idea why :fail: does not stop these messages?
 

jackie46

BANNED
Jul 25, 2005
536
0
166
Nope, doesnt work.

When a message arrived from a spoof its, [email protected] and it does not get rejected. But if the message is sent to the domain with the same user and domain name its rejected by :fail:.
 

webignition

Well-Known Member
Jan 22, 2005
1,876
2
166
jackie46 said:
Nope, doesnt work.

When a message arrived from a spoof its, [email protected] and it does not get rejected. But if the message is sent to the domain with the same user and domain name its rejected by :fail:.
What's the To: address in such cases?
 

sparek-3

Well-Known Member
Aug 10, 2002
2,148
265
388
cPanel Access Level
Root Administrator

jackie46

BANNED
Jul 25, 2005
536
0
166
Nope, the are bounces from spammers who used [email protected] and its bouncing back to our server because the domains exist here but :fail: does not stop them from piling up in the queue even if they are not being delieverd. They are not being delivered because catch-all is turned off for these domains so it goes to the queue.
 

WebScHoLaR

Well-Known Member
Dec 14, 2005
508
3
168
Planet Earth
Using :fail: the email is never accepted into the server. During the initial SMTP negotiation when the senders SMTP server connects to your SMTP server, the sending SMTP server issues a RCPT command notifying your server which email address the email to follow is intended for. Your server then checks whether the recipient email actually exists on your server (a POP3 account, an alias or a catchall alias) and if it does not, it issues an SMTP DENY which terminates the attempt to deliver the email.

* This saves bandwidth as the email data is never received into your server
* This saves server resources as the email never has to be processed
* This complies with the SMTP RFC's because the sending SMTP server receives the DENY command
* Your server does not send a bounce message (just the DENY command)
* Your server does not send anything to the sender of the email (i.e. the address in the From: line)
* The sending SMTP server is responsible for notifying the original sender
 

jackie46

BANNED
Jul 25, 2005
536
0
166
Webscholar, obviously you didnt read and follow the thread. I already said, :FAIL: is set on all 5 domains!!!!!!!!!!!!!!

I understand the process but fail does not do a thing to stop spoofed mail. The message always arrives from <>. It is addressed to [email protected] and its accepted even if ;fail: is set on the account. Maybe cpanel should look at their code and fix this issue.

So, i rewrote the rules and i havent seen a bounce back to a non existant email address since i added the changes. Spoofed mail is now being denied and so is any ridiculous email address sent to the domain in question via :fail:
 
Last edited:

webignition

Well-Known Member
Jan 22, 2005
1,876
2
166
jackie46 said:
So, i rewrote the rules and i havent seen a bounce back to a non existant email address since i added the changes. Spoofed mail is now being denied and so is any ridiculous email address sent to the domain in question via :fail:
Would you mind sharing?

I'd also be interested to see what Chirpy has to say on the matter.
 

rpmws

Well-Known Member
Aug 14, 2001
1,787
10
318
back woods of NC, USA
I am seeing this. I have bounces in queue that are destined for [email protected]_hosted_domain.com and they did not originate from my box. They came in as a bounce and just sit there. It's not a forwarder or anything special. I am also seeing something weird in this way. I forward my nobody, cpanel and root mail to an address I check. In the last week or so I have been getting emails that seem to be for accounts I host. ..ahh scratch that. I looked in the headers just now and can see "postmaster" as a BCC. I think I have a global postmaster forwarder ..but I can't remember where it is :(
 

mctDarren

Well-Known Member
Jan 6, 2004
665
8
168
New Jersey
cPanel Access Level
Root Administrator
Wow, great post jackie46. I have a client who has been a victim of this problem for a couple weeks and I never even noticed that the To: address of [email protected] should not even be getting through! This is a DEFINITELY a solution that needs to be shared. So glad you posted this! Hoping you post your rewrite as well...
 

bamm

Well-Known Member
Feb 24, 2003
75
0
156
Sorry to open a month old thread but curious how others have resolved this issue? The suggestions at webhostgear already exists in my exim.conf and does not resolve the problem.

Another issue I am seeing are emails sent to [email protected], these are totally ignored by :fail:. I attempted to add the username to /etc/aliases and while that works to filter emails sent to the [email protected], manually adding users to /etc/aliases is quite tedious.

So, with this said, the mail queues across my servers are being inundated with email sent to non existent email addresses even though their default is set to :fail: AND inundated with emails sent to [email protected]

Any help/suggestions would be greatly appreciated.
 

dob3rman

Active Member
Feb 13, 2005
29
0
151
Same here!

Same here... I have the same problem described in this thread...

Any solution yet? :rolleyes: